Skip to main content

The Application Analysis of Computer Network Security Data Encryption Technology

  • Conference paper
  • First Online:
2020 International Conference on Applications and Techniques in Cyber Intelligence (ATCI 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1244))

Abstract

In the information age, the development and application of big data technology has provided great conveniences to people’s production and life, but at the same time, it has also deteriorated the safe operating environment of computer networks, and has brought greater threats to user privacy, property and data security. The research on computer network security under big data combines the current data encryption, analysis of reasons affecting computer security, and the effective use of data encryption for computer security as the main basis. From the introduction of data encryption technology, data encryption in computer security analysis and research on effective value, destruction of data by illegal means, destruction of data by virus intrusion, determination of data encryption direction, the research on encryption technology and the application of digital encryption technology, its purpose is to strengthen the operation of data encryption technology, in order to improve the computer security, providing reference materials for related research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, Q., Lu, P.: Research on application of artificial intelligence in computer network technology. Int. J. Pattern Recognit Artif Intell. 33(5), 1959015 (2019)

    Article  Google Scholar 

  2. Shang, Y.: Discussion on data encryption technology in computer network information security. Software (12), 198–201 (2018). (in Chinese)

    Google Scholar 

  3. Liu, J.: Discussion on the application of data encryption technology in network information security. Inf. Comput. Theor. Edn. (21), 175–177 (2017). (in Chinese)

    Google Scholar 

  4. Abdel-Basset, M., Elhoseny, M., Gamal, A., Smarandache, F.: A novel model for evaluation hospital medical care systems based on plithogenic sets. Artif. Intell. Med., 31 August 2019, in Press. https://doi.org/10.1016/j.artmed.2019.101710

  5. Wu, S.: Application research of data encryption technology in computer network security. Comput. Knowl. Technol. (36), 8633–8634 (2014). (in Chinese)

    Google Scholar 

  6. Zhou, G., Yu, G.: Discussion on the application of information encryption technology in computer network security. Comput. Disc Softw. Appl. (18), 36–38 (2012). (in Chinese)

    Google Scholar 

  7. Tang, Y., Elhoseny, M.: Computer network security evaluation simulation model based on neural network. J. Intell. Fuzzy Syst. (2019). https://doi.org/10.3233/jifs-179121

  8. Hurrah, N.N., Parah, S.A., Loan, N.A., Sheikh, J.A., Elhoseny, M., Muhammad, K.: Dual watermarking framework for privacy protection and content authentication of multimedia. Future Gener. Comput. Syst. 94, 654–67 (2019). https://doi.org/10.1016/j.future.2018.12.036

  9. Song, X.: Application of data encryption technology in computer network security. Digit. Technol. Appl. (04), 54–56 (2015). (in Chinese)

    Google Scholar 

  10. He, S.: Research on application of data encryption technology in computer network security. China New Commun. (24), 25–27 (2016). (in Chinese)

    Google Scholar 

  11. Zhu, Y.: Application research of data encryption technology in computer network security. Guizhou Electr. Power Technol. (11), 74–77 (2017). (in Chinese)

    Google Scholar 

  12. Haiguo, C.: Application analysis of data encryption technology in computer network communication security. Mod. Inf. Technol. (6), 102–104 (2017). (in Chinese)

    Google Scholar 

  13. Xu, F.: The role of data encryption technology in computer network communication security. Comput. Knowl. Technol. (26), 30–31 (2017). (in Chinese)

    Google Scholar 

  14. Jian, Z., Lantian, L.: Data encryption technology and application in computer network communication security. Network Secur. Technol. Appl. (8), 57–59 (2017). (in Chinese)

    Google Scholar 

  15. Yang, W.: Application of data encryption technology in computer network communication security. Network Secur. Technol. Appl. (4), 55–56 (2017). (in Chinese)

    Google Scholar 

  16. Yan, X.: Analyzing the application of data encryption technology in computer network communication security. Inf. Commun. (04), 188–189 (2018). (in Chinese)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liu Jiang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jiang, L. (2021). The Application Analysis of Computer Network Security Data Encryption Technology. In: Abawajy, J., Choo, KK., Xu, Z., Atiquzzaman, M. (eds) 2020 International Conference on Applications and Techniques in Cyber Intelligence. ATCI 2020. Advances in Intelligent Systems and Computing, vol 1244. Springer, Cham. https://doi.org/10.1007/978-3-030-53980-1_21

Download citation

Publish with us

Policies and ethics